[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115659417A - Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment - Google Patents

Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment Download PDF

Info

Publication number
CN115659417A
CN115659417A CN202211404827.XA CN202211404827A CN115659417A CN 115659417 A CN115659417 A CN 115659417A CN 202211404827 A CN202211404827 A CN 202211404827A CN 115659417 A CN115659417 A CN 115659417A
Authority
CN
China
Prior art keywords
bloom filter
audit log
stored
monotonic
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211404827.XA
Other languages
Chinese (zh)
Inventor
范文婷
付新丽
鲍喆君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211404827.XA priority Critical patent/CN115659417A/en
Publication of CN115659417A publication Critical patent/CN115659417A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to an audit log storage method, an audit log verification method, an audit log storage device and an audit log verification device, which are applied to the field of information security and comprise the following steps: generating monotone counting information of the audit log to be stored; inserting the audit log to be stored and the monotonic counting information into the current bloom filter; when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full storage state, and inserting the data information into a root bloom filter; and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored. By adopting the method, the signature times can be reduced on the basis of ensuring the credibility of the audit log, and the credible storage of the audit log in a large scale is facilitated.

Description

Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
Technical Field
The present application relates to the field of information security technologies, and in particular, to an audit log storage method, an audit log verification method, an audit log storage apparatus, a computer device, a storage medium, and a computer program product.
Background
The secure storage of the audit log places more emphasis on the integrity, rather than confidentiality, of its contents. To protect the audit log from tampering or replay attacks, the audit log is typically hashed (Hash) and the Hash value is signed to ensure its integrity.
The existing safe storage based on the trusted computing technology comprises the safe storage of audit logs, and the integrity of the audit logs is ensured by mainly adopting a private key protected by a hardware security chip to sign the audit logs. If the whole audit log is bound and signed at intervals, the newly generated audit log content can be tampered or attacked in a replay mode after the audit log is signed for the last time.
Therefore, the log signature mode, whether the log overall signature mode or the single log signature mode, is not suitable for the safe storage of the large-scale audit logs.
Disclosure of Invention
Therefore, in order to solve the technical problem that the overall log signature mode and the single log signature mode are not suitable for the safe storage of the large-scale audit logs, a storage method, a verification device, computer equipment, a computer readable storage medium and a computer program product of the audit logs are provided.
In a first aspect, the application provides an audit log storage method. The method comprises the following steps:
acquiring an audit log to be stored, and generating monotonic counting information of the audit log to be stored;
inserting the audit log to be stored and the monotonic counting information into a current bloom filter; the current bloom filter is stored in a trusted computing environment;
when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring a next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In one embodiment, the inserting the audit log to be stored and the monotonic count information into the current bloom filter includes:
forming a binary group by the audit log to be stored and the monotonic counting information;
performing hash processing on the binary group through a preset hash function to obtain a hash value corresponding to the binary group;
determining, based on the hash value, a storage location of the tuple in the current bloom filter;
and marking the value corresponding to the storage position as a preset value, and realizing the storage of the audit log to be stored and the monotonic counting information.
In one embodiment, the generating a signature corresponding to the current bloom filter includes:
acquiring monotone counting information of each audit log stored in the current bloom filter;
and signing the monotonic counting information of each audit log through a signature private key corresponding to the trusted computing environment to obtain a signature corresponding to the current bloom filter.
In one embodiment, after inserting the audit log to be stored and the monotonic count information into the current bloom filter, the method further includes:
determining a storage state of the current bloom filter;
and when the storage state of the current bloom filter is not full, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In one embodiment, the monotonic count information of the first audit log stored in the new current bloom filter is adjacent to the monotonic count information of the last audit log stored in the current bloom filter.
In a second aspect, the application provides an audit log verification method. The method comprises the following steps:
receiving an audit log verification request sent by an audit terminal; the audit log verification request carries monotonic counting information of the audit log to be verified;
querying a current bloom filter stored in a trusted computing environment based on the monotonic count information;
if the audit log corresponding to the monotonic counting information does not exist in the current bloom filter, inquiring the bloom filter stored outside the trusted environment based on the monotonic counting information to obtain a verification result corresponding to the audit log verification request;
and returning the verification result to the audit terminal.
In one embodiment, the querying, based on the monotonic count information, a bloom filter stored outside the trusted environment to obtain a verification result corresponding to the audit log verification request includes:
determining a target bloom filter from bloom filters stored outside of the trusted environment based on the monotonic count information;
inquiring the existence result of the audit log to be verified in the target bloom filter;
and when the audit log to be verified exists in the target bloom filter, determining that the verification result is verification passing.
In one embodiment, the querying the audit log to be verified before the existence result in the target bloom filter further includes:
verifying the signature of the target bloom filter;
when the signature passes the verification, verifying the existence result of the data information corresponding to the target bloom filter in a root bloom filter; the data information is data information of the target bloom filter in a full-up state, and the root bloom filter is stored in the trusted computing environment;
and if the root bloom filter has the data information corresponding to the target bloom filter, inquiring the existence result of the audit log to be verified in the target bloom filter based on the monotonic count information.
In a third aspect, the application further provides an audit log storage device. The device comprises:
the acquisition module is used for acquiring the audit log to be stored and generating monotonic counting information of the audit log to be stored;
the first storage module is used for inserting the audit log to be stored and the monotonic counting information into the current bloom filter; the current bloom filter is stored in a trusted computing environment;
the second storage module is used for generating a signature corresponding to the current bloom filter when the storage state of the current bloom filter is full, determining data information of the current bloom filter in the full storage state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
a creation module to remove the current bloom filter from the trusted computing environment, create a new current bloom filter, and store the new current bloom filter to the trusted computing environment.
In a fourth aspect, the application further provides an audit log verification device. The device comprises:
the receiving module is used for receiving an audit log verification request sent by an audit terminal; the audit log verification request carries monotonic counting information of the audit log to be verified;
a first query module to query a current bloom filter stored in a trusted computing environment based on the monotonic count information;
a second query module, configured to, if no audit log corresponding to the monotonic count information exists in the current bloom filter, query a bloom filter stored outside the trusted environment based on the monotonic count information to obtain a verification result corresponding to the audit log verification request;
and the return module is used for returning the verification result to the audit terminal.
In a fifth aspect, the present application further provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the following steps when executing the computer program:
acquiring an audit log to be stored, and generating monotonic counting information of the audit log to be stored;
inserting the audit log to be stored and the monotonic counting information into a current bloom filter; the current bloom filter is stored in a trusted computing environment;
when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full storage state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring a next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In a sixth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
acquiring an audit log to be stored, and generating monotonic counting information of the audit log to be stored;
inserting the audit log to be stored and the monotonic counting information into a current bloom filter; the current bloom filter is stored in a trusted computing environment;
when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring a next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In a seventh aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
acquiring an audit log to be stored, and generating monotonic counting information of the audit log to be stored;
inserting the audit log to be stored and the monotonic counting information into a current bloom filter; the current bloom filter is stored in a trusted computing environment;
when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full storage state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
According to the audit log storage method, the audit log verification method, the audit log storage device, the computer equipment, the storage medium and the computer program product, on one hand, monotonic counting information of the audit log to be stored is generated, and the monotonic counting information and the audit log to be stored are stored in the current bloom filter in the trusted computing environment, so that the credibility of the audit log to be stored in the storage process is ensured. On the other hand, when the storage space of the current bloom filter is full, the integrity and the credibility of the audit logs stored by the bloom filters outside the trusted environment are ensured by generating the signature, moving the fully stored bloom filter out of the trusted computing environment, and storing the data information of the current bloom filter in the full state into the root bloom filter in the trusted computing environment. Meanwhile, the signature times are reduced by utilizing the irrevocable characteristic of the bloom filter, so that the signature times are reduced on the basis of ensuring the credibility of the audit log, and the credible storage of the audit log on a large scale is facilitated.
Drawings
FIG. 1 is a schematic flow diagram of a method for audit log storage in one embodiment;
FIG. 2 is a diagram of a bloom filter tree in one embodiment;
FIG. 3 is a schematic diagram of a complete flow of an audit log storage method in another embodiment;
FIG. 4 is a flow diagram that illustrates a method for audit log validation, according to one embodiment;
FIG. 5 is a schematic diagram of an audit log storage system in one embodiment;
FIG. 6 is a block diagram of the structure of an audit log storage device in one embodiment;
FIG. 7 is a block diagram showing the structure of an audit log verification apparatus according to an embodiment;
FIG. 8 is a diagram of an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
In an embodiment, as shown in fig. 1, an audit log storage method is provided, and this embodiment is illustrated by applying the method to a terminal, and it is to be understood that the method may also be applied to a server, and may also be applied to a system including the terminal and the server, and is implemented by interaction between the terminal and the server. The terminal can be but not limited to various personal computers, notebook computers, smart phones, tablet computers, internet of things equipment and portable wearable equipment, and the internet of things equipment can be smart sound boxes, smart televisions, smart air conditioners, smart vehicle-mounted equipment and the like. The portable wearable device can be a smart watch, a smart bracelet, a head-mounted device, and the like. The server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers. In this embodiment, the method includes the steps of:
step S110, obtaining the audit log to be stored, and generating the monotone counting information of the audit log to be stored.
Wherein the monotonic count information may be a monotonic count value.
In specific implementation, the audit log can be obtained in real time, the audit log to be stored can also be obtained from a database for temporarily storing the generated audit log, and after the audit log to be stored is obtained, a monotonic count value of the audit log to be stored can be generated through a monotonic counter and used as monotonic count information.
It should be noted that the monotonic counter is used to maintain a latest count value, which can only be monotonically increased, but cannot be backed up. Are often used to protect the freshness of data or messages, making it difficult for an attacker to exploit old data or old messages to attack the system.
Step S120, inserting the audit log to be stored and the monotonic counting information into the current bloom filter; current bloom filters are stored in trusted computing environments.
The bloom filter is used for searching whether an element is in a set or not, is a very long binary vector and a series of random hash functions, and has the advantages of excellent space efficiency and time efficiency and certain error recognition rate and difficulty in deletion. The present application takes advantage of the difficulty of its deletion. To ensure the trustworthiness of the audit log.
The Trusted computing environment represents a server or a system for storing the audit log, and uses a hardware-based security chip TPM (Trusted Platform Module, a chip planted inside a computer and providing a Trusted root for the computer) or TCM (Trusted Cryptography Module, which is a hardware Module of a Trusted computing Platform, provides a cryptographic operation function for the Trusted computing Platform, has a protected storage space), so as to provide security protection based on hardware.
In a specific implementation, each audit log item to be stored and the monotonic count information count corresponding to the audit log item to be stored may form a binary group, which is marked as (item, count) and inserted into a current bloom filter in a trusted computing environment.
More specifically, the binary group (item, count) may be hashed by a preset hash function to obtain a hash value corresponding to the binary group, a corresponding storage location of the binary group in the current bloom filter is determined based on the hash value, and the audit log to be stored and the monotonic count information are stored in the storage location of the current bloom filter. After the audit log to be stored and the monotonic counting information are stored, the storage state of the current bloom filter is further determined, so that corresponding measures can be taken according to the storage state, and the next audit log to be stored can be stored.
In this step, since an attacker cannot tamper with or replace the content of the current bloom filter in the trusted computing environment, and the binary (item, count) cannot be revoked once it is inserted, the recent audit log is complete and trusted.
Step S130, when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment.
In specific implementation, if the storage state of the current bloom filter is judged to be full, a signature corresponding to the current bloom filter can be generated based on monotonic counting information of all audit logs in the current bloom filter, the security of the audit logs stored in the current bloom filter is ensured through the signature, and the freshness of the audit logs is determined through the monotonic counting information.
The bloom filter can be regarded as a binary array with a large length, the value of each digit in the initialized array is 0, when data is stored, the data is subjected to hash operation to obtain a hash value, the hash value is used as a subscript of the array, and then the value of the corresponding digit in the initialized array is modified to 1, so that the data to be stored is realized.
Therefore, after each audit log and the monotonic count information are stored, the value of each digit of the bloom filter may change once, after the last audit log is stored, the information formed by the numerical values corresponding to the values of each digit when the current bloom filter is full is used as the data information of the current bloom filter in the full state, the data information is hashed by a hash function to obtain a hash value, the storage position of the data information in the root bloom filter is determined based on the hash value, so that the value of the digit corresponding to the storage position is adjusted to 1, and the data information of the current bloom filter in the full state is inserted into the root bloom filter.
In another embodiment, if it is determined that the storage state of the current bloom filter is not full, the next audit log to be stored is obtained, the step S110 is returned to, the step of generating the monotonic count information of the log to be stored is performed, and so on, until the storage space of the current bloom filter is full, and the step S130 is performed.
And step S140, removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In the specific implementation, when the current bloom filter which is already fully stored is removed, a new current bloom filter needs to be created, the new current bloom filter is stored in the trusted computing environment, the audit logs to be stored subsequently are stored, after each audit log is stored, the storage state of the new current bloom filter is determined, until the new current bloom filter is also fully stored, the new current bloom filter is removed from the trusted computing environment, a new current bloom filter is created, and so on, so that a root bloom filter and a current bloom filter are always stored in the trusted computing environment, and the fully stored bloom filter is moved out of the trusted computing environment through a signature, so that the storage pressure of the trusted computing environment is reduced.
In the audit log storage method, on one hand, monotonic counting information of the audit log to be stored is generated, and the monotonic counting information and the audit log to be stored are stored in a current bloom filter in a trusted computing environment, so that the credibility of the audit log to be stored in the storage process is ensured. On the other hand, when the storage space of the current bloom filter is full, the fully-stored bloom filter is moved out of the trusted computing environment by generating the signature, and the data information of the fully-stored bloom filter in the fully-stored state is stored in the root bloom filter in the trusted computing environment, so that the integrity and the credibility of audit logs stored by bloom filters outside the trusted environment are ensured. Meanwhile, the signature times are reduced by utilizing the irrevocable characteristic of the bloom filter, so that the signature times are reduced on the basis of ensuring the credibility of the audit log, and the credible storage of the large-scale audit log is facilitated.
In an exemplary embodiment, in the step S120, inserting the audit log to be stored and the monotonic count information into the current bloom filter includes:
step S1201, forming a binary group by the audit log to be stored and the monotonic counting information;
step S1202, performing hash processing on the binary group through a preset hash function to obtain a hash value corresponding to the binary group;
step S1203, determining the storage position of the binary group in the current bloom filter based on the hash value;
and step S1204, marking the value corresponding to the storage position as a preset value, and realizing the storage of the audit log to be stored and the monotonic counting information.
In the specific implementation, the bloom filter can be regarded as a binary array with a large length, each bit number in the initialized array is 0, after the audit log item to be stored and the monotonic counting information count corresponding to the audit log to be stored are formed into a binary group (item, count), the binary group can be hashed through a plurality of preset hash functions to obtain a plurality of hash values corresponding to the binary group, the hash values serve as subscripts of the array, and then the value of the corresponding bit number in the initialized array is modified to be 1, so that the audit log to be stored and the monotonic counting information can be stored.
In the embodiment, the bloom filter is used for storing the audit log to be stored and the monotonic counting information of the audit log to be stored, the signature is only required to be carried out once when the bloom filter is full by utilizing the characteristic of unrevoable property of the bloom filter, and a signature is not required to be generated after each audit log is stored, so that the signature frequency can be greatly reduced.
In an exemplary embodiment, in the step 130, generating a signature corresponding to the current bloom filter includes: acquiring monotone counting information of each audit log stored in a current bloom filter; and performing signature processing on the monotonic counting information of each audit log through a signature private key corresponding to the trusted computing environment to obtain a signature corresponding to the current bloom filter.
The signature private key is protected by a trusted computing environment, the protection mode depends on different trusted computing technologies, and the application does not limit the protection mode. For example, the protection mode may be that the signature private key is automatically destroyed after the trusted computing environment is destroyed, or the private key is located in the hardware such as the trusted chip and cannot appear in the memory. The signature private key is a private key of a trusted computing environment where the principal is located, represents the identity of the environment, and is independent of the principal.
In specific implementation, the monotonic count information of each audit log in the current bloom filter is set as count 1 、count 2 、…、count n Then, the monotonic counting information of each audit log can be signed by a signature private key corresponding to the trusted computing environment, and a signature about all monotonic counting information is obtained: sign (count) 1 ,count 2 ,…,count n )。
In this embodiment, the signature is generated by the monotonic count information of each audit log stored in the current bloom filter, so that the slave count can be ensured 1 To count n The bloom filter of (1) is the integrity of the list of audit logs stored.
In an exemplary embodiment, the monotonic count information of the first audit log stored in the new current bloom filter is adjacent to the monotonic count information of the last audit log stored in the current bloom filter.
Specifically, the monotonic count value between each bloom filter is continuous, for example, the monotonic count value of the audit log stored by the first bloom filter is count 1 -count 50 Then the monotonic count value of the stored audit log stored by the second bloom filter needs to be counted from count 51 Begin to monotonically increase.
In this embodiment, the new monotonic count information of the first audit log stored in the current bloom filter is adjacent to the monotonic count information of the last audit log stored in the current bloom filter, so that the count can be checked later n+ 1 corresponds to (item, count) n+1 ) Whether the B _ cur is inserted or not is judged to verify whether the bloom filter B _ n corresponding to the monotonic count information is the one corresponding to the monotonic count informationThe previous bloom filter of Bcur stored in the trusted computing environment to verify the integrity of the audit log.
Referring to fig. 2, a schematic diagram of a bloom filter tree according to an exemplary embodiment is shown, where as shown in fig. 2, the bloom filter tree is a two-layer tree structure, and leaf nodes of the bloom filter tree are used for directly recording existence of audit logs, and root nodes of the bloom filter tree are used for recording existence of leaf nodes. The storage step of the audit log is shown in the flow chart shown in fig. 3:
(1) And acquiring the audit log item to be stored, and generating a monotone count value of the audit log to be stored.
(2) And forming a binary group (item, count) by the audit log item to be stored and the current monotonic count value count, and then inserting the binary group into the current bloom filter B _ cur.
(2) If the storage space of the current bloom filter B _ cur is full, the current bloom filter B _ cur is moved out of the trusted computing environment, a signature Sign of the current bloom filter B _ cur is generated, and the hash value of the data information of the current bloom filter B _ cur in the full storage state is calculated: hash (B _ cur, count), which is inserted into the root bloom filter B _ root.
(3) A new current bloom filter B _ cur' is created and stored in the trusted computing environment.
(4) And acquiring the next audit log to be stored, and executing the step of storing the new current bloom filter B _ cur'.
(5) And if the storage space of the current bloom filter B _ cur is not full, directly obtaining the next audit log to be stored, and executing the step of storing the next audit log to be stored in the current bloom filter B _ cur.
To reduce the storage pressure of the trusted computing environment, only the root bloom filter B _ root and the current bloom filter B _ cur may be stored in the trusted computing environment, while the other portions of the bloom filters in fig. 2 are stored outside the trusted computing environment. Since an attacker cannot tamper with or replace B _ cur in a trusted computing environment, while a binary (item, count) cannot be revoked once inserted, the recent audit log is complete and completeTrusted. Meanwhile, signature Sign (count) 1 ,count 2 ...count n ) Ensure the slave count 1 To count n The list of historical bloom filters of (1) is complete and then the integrity of each individual bloom filter is checked with the root bloom filter B _ root. Finally, the count needs to be verified n The corresponding B _ n is the previous bloom filter of B _ cur stored in the trusted computing environment, specifically by checking the count n+1 Corresponding (item, count) n+1 ) Whether or not B _ cur is inserted.
In the embodiment, the integrity of the audit log is protected by adopting the bloom filter tree and the monotonic counter, and the credibility and the freshness of the integrity are ensured by utilizing a signature mechanism of trusted computing and the monotonic counter.
In an embodiment, as shown in fig. 4, an audit log verification method is provided, and this embodiment is illustrated by applying this method to a terminal, and it is to be understood that this method may also be applied to a server, and may also be applied to a system including a terminal and a server, and is implemented by interaction between the terminal and the server. In this embodiment, the method includes the steps of:
step S410, receiving an audit log verification request sent by an audit terminal; the audit log verification request carries monotonic counting information of the audit log to be verified;
step S420, inquiring a current bloom filter stored in the trusted computing environment based on the monotonic count information;
step S430, if the audit log corresponding to the monotonic count information does not exist in the current bloom filter, inquiring the bloom filter stored outside the trusted environment based on the monotonic count information to obtain a verification result corresponding to the audit log verification request;
and step S440, returning a verification result to the audit terminal.
In the specific implementation, when the audit log is verified, the audit terminal sends an audit log request to the trusted verification terminal, the trusted verification terminal firstly inquires whether the current bloom filter stored in the trusted computing environment has the audit log to be verified according to monotonic counting information of the audit log to be verified, wherein the monotonic counting information is carried in the audit log verification request, if the current bloom filter has the audit log corresponding to the monotonic counting information, the audit log is complete and credible, the verification can be determined to pass, and the verification result passing the verification is returned to the audit terminal. On the contrary, if the audit log corresponding to the monotonic counting information does not exist in the current bloom filter, inquiring the bloom filter stored outside the trusted environment based on the monotonic counting information to obtain a verification result corresponding to the verification request of the audit log, and returning the verification result to the audit terminal.
In some embodiments, the audit log request may carry monotonic count information of a plurality of audit logs to be verified, at this time, whether an audit log corresponding to each monotonic count information exists in a current bloom filter stored in the trusted computing environment may be queried one by one according to each monotonic count information, and when an audit log corresponding to a certain monotonic count information is not in the current bloom filter, the bloom filter stored outside the trusted environment is further queried until a query result corresponding to each monotonic count information is obtained, and the query result is used as a verification result corresponding to the audit log verification request.
In this embodiment, the integrity of the audit log is protected by the bloom filter, and the presence check of the bloom filter is used instead of a large number of signature operations and signature verification operations. And the existence checking operation efficiency of the bloom filter is far higher than that of the signature and signature verification operation, so that the whole scheme overcomes the problem of frequent signature and has higher efficiency. And the scheme supports integrity verification of a part of the audit log without verifying all the audit log.
In an exemplary embodiment, step S420 may be specifically implemented by the following steps:
step S4201, based on the monotonic count information, determining a target bloom filter from bloom filters stored outside the trusted environment;
step S4202, inquiring the existence result of the audit log to be verified in the target bloom filter;
step S4203, when the audit log to be verified exists in the target bloom filter, the verification result is determined to be verification passing.
In the specific implementation, because the monotonic count information of the audit logs stored by different bloom filters is continuously increased, the target bloom filter corresponding to the audit log to be verified can be determined based on the monotonic count information carried by the audit log verification request, the existence result of the audit log to be verified in the target bloom filter is inquired, if the audit log to be verified exists in the target bloom filter, the verification result is determined to be passed, otherwise, if the audit log to be verified does not exist in the target bloom filter, the verification result is determined to be failed.
In this embodiment, the target bloom filter corresponding to the audit log to be verified is determined according to the monotonic count information carried in the audit log verification request, and thus, only the existence result of the audit log to be verified in the target bloom filter needs to be queried, and other bloom filters do not need to be queried, so that the verification efficiency of the audit log can be greatly improved.
In an exemplary embodiment, before step S4202, the method further includes: verifying the signature of the target bloom filter; when the signature passes the verification, verifying the existence result of the data information corresponding to the target bloom filter in the root bloom filter; the data information is the data information of the target bloom filter in a full storage state, and the root bloom filter is stored in the trusted computing environment; and if the data information corresponding to the target bloom filter exists in the root bloom filter, inquiring the existence result of the audit log to be verified in the target bloom filter based on the monotonic counting information.
In a specific implementation, after a target bloom filter is determined, signature verification and existence check of the target bloom filter are required before querying the existence result of an audit log to be verified in the target bloom filter.
For example, let the signature of the target bloom filter be Sign (count) 1 ,count 2 ...count n ) The signature verification can be carried out through a public keyAfter the verification is passed, whether the data information corresponding to the target bloom filter exists in the root bloom filter is verified, and more specifically, the data information corresponding to the target bloom filter is subjected to Hash processing through a Hash function to obtain a Hash value Hash (B _1, count) B_1 ) Verifying the Hash value Hash (B _1, count) B_1 ) And if the audit log exists in the root bloom filter B _ root, further inquiring a target filter, and inquiring and verifying the audit log to be verified.
In the embodiment, for the verification of the audit log stored in one bloom filter, only one signature verification and the existence check of the target bloom filter are needed to replace a large number of signature verification operations, so that the operation efficiency is greatly improved.
Referring to FIG. 5, a schematic diagram of an audit log storage system is shown for an exemplary embodiment, including:
and the log generation module is used for continuously recording the audit log.
And the log storage module is used for storing the audit log generated by the log generation module. Unlike conventional log storage modules, the log storage module of the present application needs to attach the current value count of the monotonic counter to the back of each audit log entry.
And the trusted log module is used for receiving the new log generated by the log generation module, giving the current monotonic count value to the new log, and taking charge of the insertion operation of the bloom filter and the replacement of the new bloom filter when the current bloom filter is full. The trusted log module is constructed based on a trusted computing environment, and holds a signature private key, and the private key is protected by the trusted computing environment. The protection mode depends on different trusted computing technologies, and the present application is not limited, for example, the private key may be automatically destroyed after the environment is destroyed, or the private key may be located in a hardware such as a trusted chip and may not appear in the memory. The signature private key is a private key of a trusted computing environment where the main body is located, represents the identity of the environment and is irrelevant to the main body. In addition, the trusted log module further includes a monotonic counter, the value of which is only monotonically increased and protected by the trusted environment and cannot be tampered, the protection mode depends on different trusted computing technologies, and the present application is not limited, for example, the monotonic counter can be implemented in a hardware chip such as a trusted chip.
The credibility verification module is used for receiving an audit log verification request sent by an audit terminal and executing verification operation, and the main verification process comprises the following steps:
a. and the credible verification module receives an audit log verification request sent by an audit terminal.
b. The credibility verification module reads the audit log stored by the log storage module, reads the B _ cur of the bloom filter tree in the credible computing environment, and then starts verification from the latest log item of the audit log. If (item, count) is in B _ cur, then the log entry is complete and trusted; until (item _ i, count _ i) corresponding to a certain log entry item _ i is not in B _ cur.
c. The trusted verification module further reads a portion of the bloom filter tree outside of the trusted computing environment and verifies the signature Sign (count 1, count2.... Countn), and then verifies whether the Hash (B _1, count 1), hash (B _2, co-count2.. Hash (B _ n, count) is in the B _ root. If the signature verification and the B _ root verification are both passed, starting from (item _ i, count _ i) to continue to carry out log item verification by using the latest historical bloom filter B _ n until all log items are verified to be inserted into the bloom filter tree, and then returning a verification passing conclusion to the audit terminal by the trusted verification module. If any item (item) in the audit log is not in the bloom filter tree, returning a conclusion that the verification fails to pass to the audit terminal.
The application realizes a tamper-proof and counterfeit-proof trusted audit log storage method, and has the following beneficial effects:
(1) The credible basis of the whole scheme is established on the basis of the hardware security chip, so that the method has stronger security. (2) A bloom filter is innovatively used for protecting the integrity of an audit log, and the existence check of the bloom filter is adopted to replace a large number of signature operations and signature verification operations. And the existence checking operation efficiency of the bloom filter is far higher than that of the signature and signature verification operation, so that the whole scheme overcomes the problem of frequent signature and has higher efficiency. (3) A bloom filter tree structure is innovatively constructed, the occupation of storage space in a trusted computing environment is reduced, and meanwhile integrity verification of a part of an audit log is supported without verifying all the audit logs. For example, only integrity verification is performed on the most recent audit log, and only B _ cur can be used for verification. (4) The combination use of the bloom filter and the monotonic counter can effectively find the problems of replay attack and audit log missing. (5) Because of advantages 2 and 3, each bloom filter can be independently verified, and the signature only occurs when a new bloom filter is created, and the signature verification only needs to be verified once, the scheme is suitable for large-scale log storage.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides an audit log storage device for realizing the audit log storage method and an audit log verification device for realizing the audit log verification method. The implementation schemes for solving the problems provided by the two apparatuses are similar to the implementation schemes recorded in the above methods, so that the following embodiments of one or more audit log storage apparatuses and the specific limitations in the audit log verification apparatus may refer to the limitations on the audit log storage method and the audit log verification method, and are not described herein again.
In one embodiment, as shown in fig. 6, there is provided an audit log storage device, including:
the obtaining module 610 is configured to obtain an audit log to be stored, and generate monotonic count information of the audit log to be stored;
the first storage module 620 is configured to insert the audit log to be stored and the monotonic count information into the current bloom filter; the current bloom filter is stored in the trusted computing environment;
a second storage module 630, configured to generate a signature corresponding to the current bloom filter when the storage state of the current bloom filter is full, determine data information of the current bloom filter in the full storage state, and insert the data information into the root bloom filter; the root bloom filter is stored in the trusted computing environment;
a creating module 640 for removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, and storing the new current bloom filter in the trusted computing environment.
In an embodiment, the first storage module 620 is specifically configured to form a binary group by using the audit log to be stored and the monotonic count information; carrying out hash processing on the binary group through a preset hash function to obtain a hash value corresponding to the binary group; determining the storage position of the binary group in the current bloom filter based on the hash value; and marking the value corresponding to the storage position as a preset value, and realizing the storage of the audit log to be stored and the monotonic counting information.
In an embodiment, the second storage module 630 is specifically configured to obtain monotonic count information of each audit log stored in the current bloom filter; and signing the monotonic counting information of each audit log through a signature private key corresponding to the trusted computing environment to obtain a signature corresponding to the current bloom filter.
In one embodiment, the apparatus further comprises a determining module, configured to determine a storage status of the current bloom filter; and when the storage state of the current bloom filter is not full, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
In one embodiment, the monotonic count information of the first audit log stored in the new current bloom filter is adjacent to the monotonic count information of the last audit log stored in the current bloom filter.
In one embodiment, as shown in fig. 7, there is provided an audit log verification apparatus, including:
a receiving module 710, configured to receive an audit log verification request sent by an audit terminal; verifying that the request carries monotonic counting information of the audit log to be verified;
a first query module 720 for querying a current bloom filter stored in the trusted computing environment based on the monotonic count information;
the second query module 730 is configured to, if an audit log corresponding to the monotonic count information does not exist in the current bloom filter, query the bloom filter stored outside the trusted environment based on the monotonic count information to obtain a verification result corresponding to the audit log verification request;
and a returning module 740, configured to return the verification result to the audit terminal.
In one embodiment, the second query module 730 is further configured to determine a target bloom filter from bloom filters stored outside the trusted environment based on the monotonic count information; inquiring the existence result of the audit log to be verified in the target bloom filter; and when the audit log to be verified exists in the target bloom filter, determining that the verification result is verification passing.
In one embodiment, the second query module 730 is further configured to verify the signature of the target bloom filter; when the signature passes the verification, verifying the existence result of the data information corresponding to the target bloom filter in the root bloom filter; the data information is the data information of the target bloom filter in a full storage state, and the root bloom filter is stored in the trusted computing environment; and if the data information corresponding to the target bloom filter exists in the root bloom filter, inquiring the existence result of the audit log to be verified in the target bloom filter based on the monotonic counting information.
The modules in the audit log storage device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the computer device is used for communicating with an external terminal in a wired or wireless manner, and the wireless manner can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program when executed by a processor implements an audit log storage method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In an embodiment, a computer program product is provided, comprising a computer program which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), for example. The databases involved in the embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (13)

1. An audit log storage method, the method comprising:
acquiring an audit log to be stored, and generating monotonic counting information of the audit log to be stored;
inserting the audit log to be stored and the monotonic counting information into a current bloom filter; the current bloom filter is stored in a trusted computing environment;
when the storage state of the current bloom filter is full, generating a signature corresponding to the current bloom filter, determining data information of the current bloom filter in the full state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
and removing the current bloom filter from the trusted computing environment, creating a new current bloom filter, storing the new current bloom filter into the trusted computing environment, acquiring a next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
2. The method of claim 1, wherein the inserting the audit log to be stored and the monotonic count information into a current bloom filter comprises:
forming a binary group by the audit log to be stored and the monotonic counting information;
performing hash processing on the binary group through a preset hash function to obtain a hash value corresponding to the binary group;
determining, based on the hash value, a storage location of the tuple in the current bloom filter;
and marking the value corresponding to the storage position as a preset value, and realizing the storage of the audit log to be stored and the monotonic counting information.
3. The method of claim 1, wherein the generating the signature corresponding to the current bloom filter comprises:
acquiring monotone counting information of each audit log stored in the current bloom filter;
and signing the monotonic counting information of each audit log through a signature private key corresponding to the trusted computing environment to obtain a signature corresponding to the current bloom filter.
4. The method of claim 1, wherein inserting the audit log to be stored and the monotonic count information after the current bloom filter further comprises:
determining a storage state of the current bloom filter;
and when the storage state of the current bloom filter is not full, acquiring the next audit log to be stored, and returning to the step of generating the monotonic counting information of the log to be stored.
5. The method of claim 1, wherein the monotonic count information of a first audit log stored in the new current bloom filter is adjacent to the monotonic count information of a last audit log stored in the current bloom filter.
6. An audit log verification method, the method comprising:
receiving an audit log verification request sent by an audit terminal; the audit log verification request carries monotonic counting information of the audit log to be verified;
querying a current bloom filter stored in a trusted computing environment based on the monotonic count information;
if the audit log corresponding to the monotonic counting information does not exist in the current bloom filter, inquiring the bloom filter stored outside the trusted environment based on the monotonic counting information to obtain a verification result corresponding to the audit log verification request;
and returning the verification result to the audit terminal.
7. The method of claim 6, wherein querying a bloom filter stored outside the trusted environment based on the monotonic count information to obtain a verification result corresponding to the audit log verification request comprises:
determining a target bloom filter from bloom filters stored outside of the trusted environment based on the monotonic count information;
inquiring the existence result of the audit log to be verified in the target bloom filter;
and when the audit log to be verified exists in the target bloom filter, determining that the verification result is verification passing.
8. The method of claim 7, wherein querying the audit log to be verified before the presence result in the target bloom filter further comprises:
verifying the signature of the target bloom filter;
when the signature passes the verification, verifying the existence result of the data information corresponding to the target bloom filter in a root bloom filter; the data information is data information of the target bloom filter in a full-up state, and the root bloom filter is stored in the trusted computing environment;
and if the root bloom filter has the data information corresponding to the target bloom filter, inquiring the existence result of the audit log to be verified in the target bloom filter based on the monotonic count information.
9. An audit log storage device, the device comprising:
the acquisition module is used for acquiring the audit log to be stored and generating monotonic counting information of the audit log to be stored;
the first storage module is used for inserting the audit log to be stored and the monotonic counting information into the current bloom filter; the current bloom filter is stored in a trusted computing environment;
the second storage module is used for generating a signature corresponding to the current bloom filter when the storage state of the current bloom filter is full, determining data information of the current bloom filter in the full storage state, and inserting the data information into a root bloom filter; the root bloom filter is stored in the trusted computing environment;
a creation module to remove the current bloom filter from the trusted computing environment, create a new current bloom filter, and store the new current bloom filter to the trusted computing environment.
10. An audit log verification apparatus, the apparatus comprising:
the receiving module is used for receiving an audit log verification request sent by an audit terminal; the audit log verification request carries monotonic counting information of the audit log to be verified;
a first query module to query a current bloom filter stored in a trusted computing environment based on the monotonic count information;
the second query module is used for querying the bloom filter stored outside the trusted environment based on the monotonic count information if the audit log corresponding to the monotonic count information does not exist in the current bloom filter, so as to obtain a verification result corresponding to the audit log verification request;
and the returning module is used for returning the verification result to the auditing terminal.
11. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program performs the steps of the method according to any of claims 1 to 8.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
13. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 8 when executed by a processor.
CN202211404827.XA 2022-11-10 2022-11-10 Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment Pending CN115659417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211404827.XA CN115659417A (en) 2022-11-10 2022-11-10 Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211404827.XA CN115659417A (en) 2022-11-10 2022-11-10 Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment

Publications (1)

Publication Number Publication Date
CN115659417A true CN115659417A (en) 2023-01-31

Family

ID=85020908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211404827.XA Pending CN115659417A (en) 2022-11-10 2022-11-10 Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment

Country Status (1)

Country Link
CN (1) CN115659417A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116028990A (en) * 2023-03-30 2023-04-28 中国科学技术大学 Anti-tampering privacy protection log auditing method based on blockchain
CN117176472A (en) * 2023-10-30 2023-12-05 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116028990A (en) * 2023-03-30 2023-04-28 中国科学技术大学 Anti-tampering privacy protection log auditing method based on blockchain
CN117176472A (en) * 2023-10-30 2023-12-05 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment
CN117176472B (en) * 2023-10-30 2024-01-09 杭州海康威视数字技术股份有限公司 Data tamper-proof method, device and system based on intelligent password security equipment

Similar Documents

Publication Publication Date Title
US20220027515A1 (en) Decentralized Token Table Generation
US9720943B2 (en) Columnar table data protection
CN107220559B (en) Encryption storage method for non-tamperable file
US12010213B2 (en) Pruning entries in tamper-evident data stores
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN101853190B (en) Data integrity verification method suitable for embedded processor
EP3794767A1 (en) Improved systems and methods for storage, generation and verification of tokens used to control access to a resource
RU2351978C2 (en) Method for provision of data records set integrity
CN115659417A (en) Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
CN111641712A (en) Block chain data updating method, device, equipment, system and readable storage medium
CN113704357A (en) Smart city data sharing method and system based on block chain
He et al. Public integrity auditing for dynamic regenerating code based cloud storage
CN114338081B (en) Multi-block-chain unified identity authentication method, device and computer equipment
CN116192395A (en) Trusted system for distributed data storage
Weintraub et al. Data integrity verification in column-oriented NoSQL databases
He et al. Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T‐Merkle Hash Tree Based Blockchain
US11502856B2 (en) Method for providing information to be stored and method for providing a proof of retrievability
Li et al. Post‐Quantum Privacy‐Preserving Provable Data Possession Scheme Based on Smart Contracts
CN113468549A (en) Retrieval method and system for encrypted information evidence based on block chain and electronic equipment
Rao et al. Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security
CN115439118B (en) Digital certificate storage management method based on blockchain
Wang et al. SStore: an efficient and secure provable data auditing platform for cloud
Ding et al. A Low‐Overhead Auditing Protocol for Dynamic Cloud Storage Based on Algebra
CN114090588A (en) Block chain presence verification method and device, computer equipment and storage medium
CN115757310A (en) Credit information sharing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination